This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.
A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system. 相似文献
ABSTRACTEmbedding a hidden stream of bits in a cover file to prevent illegal use is called digital watermarking. The cover file could be a text, image, video, or audio. In this study, we propose invisible watermarking based on the text included in a webpage. Watermarks are based on predefined structural and syntactic rules, which are encrypted and then converted into zero-width control characters using binary model classification before embedding into a webpage. This concept means that HTML (Hyper Text Markup Language) is used as a cover file to embed the hashed and transparent zero-width watermarks. We have implemented the proposed invisible watermarking against various attacks to reach optimum robustness. 相似文献
We begin by showing how to faithfully encode the Classical ModalDisplay Logic (CMDL) of Wansing into the Calculus of Structures(CoS) of Guglielmi. Since every CMDL calculus enjoys cut-elimination,we obtain a cut-elimination theorem for all corresponding CoScalculi. We then show how our result leads to a minimal cut-freeCoS calculus for modal logic S5. No other existing CoS calculifor S5 enjoy both these properties simultaneously. 相似文献
The calculations of the elastic scattering properties of ultra-cold francium isotopes are reported in detail. A parametric model potential for the triplet molecular states of the Fr2 is represented, and the scattering lengths at and the effective range re are calculated using WKB and Numerov methods for Fr--Fr in the triplet state. The convergence of these scattering properties depending on a K0 parameter and core radius is also investigated using two methods: Quantum Defect Theory and analytical formula of Symskoviski. 相似文献
A new approach, called the “variational theory of complex rays” has been developed in order to calculate the vibrations of slightly damped elastic plates in the medium-frequency range. The resolution of a small system of equations which does not result from a fine spatial discretization of the structure leads to the evaluation of effective quantities (deformation energy, vibration amplitude,…). Here, we extend this approach, which was already validated for assemblies of homogeneous substructures, to the case of heterogeneous substructures. 相似文献